Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions

From MaRDI portal
Publication:5261668

DOI10.1007/978-3-662-46497-7_1zbMath1379.94032OpenAlexW113457696MaRDI QIDQ5261668

Zvika Brakerski, Vinod Vaikuntanathan

Publication date: 6 July 2015

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_1




Related Items (38)

Constraining and Watermarking PRFs from Milder AssumptionsAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityFunction-private conditional disclosure of secrets and multi-evaluation threshold distributed point functionsWatermarking Cryptographic CapabilitiesQuantum algorithms for variants of average-case lattice problems via filteringAttribute-based proxy re-encryption from standard latticesTransparent batchable time-lock puzzles and applications to Byzantine consensusPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessConstrained pseudorandom functions from homomorphic secret sharingABE for circuits with constant-size secret keys and adaptive securityAdaptive multiparty NIKEFull quantum equivalence of group action DLog and CDH, and moreBeyond software watermarking: traitor-tracing for pseudorandom functionsConstrained (Verifiable) Pseudorandom Function from Functional EncryptionA lower bound for proving hardness of learning with rounding with polynomial modulusAdaptively secure inner product encryption from LWEImproving speed and security in updatable encryption schemesIncremental symmetric puncturable encryption with support for unbounded number of puncturesBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationPseudorandom functions in NC class from the standard LWE assumptionConstrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key DelegationConstraining Pseudorandom Functions PrivatelyPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWECryptography with UpdatesWatermarking cryptographic functionalities from standard lattice assumptionsVerifiable random functions from non-interactive witness-indistinguishable proofsConstrained pseudorandom functions from functional encryptionRevocable attribute-based proxy re-encryptionExtracting randomness from extractor-dependent sourcesRound-optimal verifiable oblivious pseudorandom functions from ideal latticesOn publicly-accountable zero-knowledge and small shuffle argumentsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationAdaptively secure constrained pseudorandom functions in the standard modelPseudorandom Functions: Three Decades LaterKey-homomorphic pseudorandom functions from LWE with small modulus




This page was built for publication: Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions